Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 21:38
Behavioral task
behavioral1
Sample
d0cc9bca2fd0b86d320f43bef21ed080N.exe
Resource
win7-20240704-en
General
-
Target
d0cc9bca2fd0b86d320f43bef21ed080N.exe
-
Size
47KB
-
MD5
d0cc9bca2fd0b86d320f43bef21ed080
-
SHA1
bce32b3cc3bc4995b44d036e56ae749fff9fd5ce
-
SHA256
0a7d173503f72f4283f89065637f421bb4f2d5aa8c721a3004091d2d575132a9
-
SHA512
014519f4e5525c728c2dddc567b9ce7ba498ee44996e4dd0eeba46e96f8da0b2ace767ef8cc3a42393869c15910fcc1e957b176f03848c91e661f5bff80cff4f
-
SSDEEP
768:Iv9ilrnywLsYg+0yq2vWdT9SOaNou0yWH7oXzO8ZGjSjAsOmA0acpTFoSI:fjxsz40yvXHGjUAsOPCo3
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation d0cc9bca2fd0b86d320f43bef21ed080N.exe -
Executes dropped EXE 1 IoCs
pid Process 2464 conwurm.exe -
resource yara_rule behavioral2/memory/3752-0-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/files/0x0009000000023409-8.dat upx behavioral2/memory/3752-13-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/2464-16-0x0000000000400000-0x0000000000417000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0cc9bca2fd0b86d320f43bef21ed080N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language conwurm.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3752 wrote to memory of 2464 3752 d0cc9bca2fd0b86d320f43bef21ed080N.exe 84 PID 3752 wrote to memory of 2464 3752 d0cc9bca2fd0b86d320f43bef21ed080N.exe 84 PID 3752 wrote to memory of 2464 3752 d0cc9bca2fd0b86d320f43bef21ed080N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0cc9bca2fd0b86d320f43bef21ed080N.exe"C:\Users\Admin\AppData\Local\Temp\d0cc9bca2fd0b86d320f43bef21ed080N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\conwurm.exe"C:\Users\Admin\AppData\Local\Temp\conwurm.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5d8d18d4b5ec9944adb089e1cb0f36fc5
SHA19a97a4f6b9e58f108f3c1154b0d4344dbf94ef6d
SHA256425cedff2e80af7825ff8d23e1d41af19cdf33e6a548b1c674a1424c534fb488
SHA5121936a4375875dd27804876eee1794ebeea8c848c2ead2fdebeae5b82ec4b57dfa75c69fc3731ea148dae382ad51d03afc3573ad0f7880cbf26acb94322f7802a